Abstract
Recently, Wu and Hsu showed that Lee and Chang’s anonymous user identification and key establishment protocol was insecure with regard to two attacks and proposed an improved protocol, called the WH protocol. In this paper, we show that the WH protocol is still vulnerable to an unknown-key share attack. Then, we propose an improved protocol to address this problem by applying a mutual authentication method.
This research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Assessment).
Preview
Unable to display preview. Download preview PDF.
References
Diffie, W., van Oorschot, P., Wiener, M.: Authentication and authenticated key exchanges, Designs. Codes and Cryptography 2, 107–125 (1992)
Lee, W.B., Chang, C.C.: User identification and key distribution maintaining anonymity for distributed computer network. Computer Syst Sci Eng. 15(4), 211–214 (2000)
Wu, T.-S., Hsu, C.-L.: Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. Computers and Security 23, 120–125 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, WH., Yoo, KY. (2005). New Anonymous User Identification and Key Establishment Protocol in Distributed Networks. In: Pal, A., Kshemkalyani, A.D., Kumar, R., Gupta, A. (eds) Distributed Computing – IWDC 2005. IWDC 2005. Lecture Notes in Computer Science, vol 3741. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11603771_46
Download citation
DOI: https://doi.org/10.1007/11603771_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30959-8
Online ISBN: 978-3-540-32428-7
eBook Packages: Computer ScienceComputer Science (R0)